Online | Mar 21, 2018 at 5:00 UTC

Video Meetup

On this video meetup, we will be joined by Katie Brennan, KnowBe4’s expert Phishing Template Designer, as she shares best practices on how to phish your users. She’ll demonstrate examples of the latest “In the Wild” phishing attempts and how this proves anything can be weaponized. We'll also be joined by an IT pro from the Spiceworks Community.
What we're discussing:
- Phishing mistakes and how to avoid them
- Phishing template difficulty ratings and why they matter
- Why phishing your users is a cybersecurity best practice
- How to develop a response plan if phishing attempts were successful
BONUS: One attendee of the live event will win a $350 Amazon Gift Card

Online | Mar 21, 2018 at 6:00 UTC

Webinar

Lock IT Down with Lenovo
To succeed in the changing dynamics of the technology industry, it is critical that organizations break status quo and do things differently.
Learn more about how you can fully protect your organization’s IT infrastructure including hardware, asset management and software security.
Join Lenovo to learn more about industry changes and how Lenovo’s product portfolio and strategy are designed to stand out and deliver different and better solutions.
What we're discussing:
Why Lenovo
Win 10 Security
Lenovo PC Portfolio
BONUS: One lucky Attendee will win a Plantronics-CS540 Convertible Wireless Headset

Online | Mar 22, 2018 at 6:00 UTC

Video Meetup

Small and medium businesses often get lumped together in the same category (“SMB”) but when it comes to security, do you know how the challenges a 50-person company faces differs from a 500-person company?
Join us for a video meetup where we’ll talk about the differences in security needs and capabilities for small and mid-sized companies, and what security technologies are most effective for each. We’ll be joined by an expert from Fortinet as well as an IT pro from the Spiceworks Community.
What we’ll discuss:
- Do small businesses and mid-sized businesses face the same breach threats and attack vectors?
- How do you gauge the complexity of your network and security needs beyond just the number of employees?
- Are solutions like sandboxing and security automation really feasible for small businesses and mid-sized businesses?
BONUS: One attendee of this live event will a Canon Powershot SX730 Digital Camera Bundle

Online | Mar 23, 2018 at 4:00 UTC

Webinar

Making the Move to DevSecOps from DevOps
Organizations focused on the repeatable accelerated deployment and implementation of systems and applications as part of a DevOps initiative, now find themselves faced with the need to also ensure the security of those environments. With cyber-attacks continuing to grow at a rapid rate, it’s critical for organizations to build in security as part of operations and leverage automation.
Join industry expert, Nick Cavalancia, Benjamin Andrew from AWS Marketplace, and Torsten Kablitz from Change Healthcare as they discuss:
How to define DevSecOps – the what, why, and how, of adding security to DevOps
Treating Security as Code – ensuring certain security concerns aren’t left behind
How to get to DevSecOps – leveraging innovation, integration, and automation to simplify and solidify security as part of deployment.
BONUS: One lucky attendee will win an Amazon Cloud Cam Indoor Security Camera

Online | Mar 29, 2018 at 6:00 UTC

Video Meetup

Whether it’s a data breach, exfiltration, malware, or ransomware, when a security incident occurs every minute counts. What is YOUR plan for containing the threat, recovering the data, and, most importantly, rectifying the security hole that allowed the breach in the first place?
On this Video Meetup we’ll talk about the important steps to take immediately following a security incident, and how adapt your response plan based on new information about the threat landscape. We’ll be talking with an IT pro from the Spiceworks Community, as well as experts from Cisco and Talos.
What we're discussing:
- Building a plan to identify the attacker, contain the situation, identify the root cause, and remedy the issue
- Incorporating threat intelligence into your incident detection
- Benefits and costs of Incident Response Services

Online | Apr 11, 2018 at 6:00 UTC

Webinar

Fighting Ransomware with Active Protection
A revolutionary approach to avoiding data loss and the other huge costs of ransomware
Ransomware remains the nastiest, fastest-growing malware threat to businesses today: over half of businesses got hit by it last year, and the extortion losses alone will hit $11.5B by 2019, never mind the larger costs of downtime, lost customers, etc.
This session examines how ransomware works, how it got to be such a surging threat, and how you can defend your company against it with a combination of policies, procedures, and innovative data protection technologies. Don’t get caught flat-footed when the next inevitable ransomware attack explodes.
Learn how to stop ransomware before it can wreak havoc on your business.
BONUS: One attendee will win an iRobot Braava jet 240 Robot Mop